Intel Reveals a Serious New Chip Security Flaw

Posted on May 14, 2019 by Paul Thurrott in Hardware with 17 Comments

Over a year after the Meltdown and Spectre security flaws ravaged the PC industry, Intel has revealed a new, even more serious set of vulnerabilities.

The new flaws are called Microarchitectural Data Sampling, or MDS, and while the processor giant and the security researchers who discovered them have never seen exploits in the wild, they’ve been able to create exploits of their own as a proof of concept.

Though the Intel chipsets released this year include a fix for the flaws, they impact every Intel microprocessor released since 2011, so previous versions will need to be patched. Those patches are already available, but some, depending on the chipset, could slow performance by as much as 19 percent. Worse, the fixes for older chipsets don’t completely mitigate the problems.

The security researchers who worked with Intel have released their own information about the flaws as well, and each has created sample exploits to demonstrate the issues. One group has named their exploits RIDL and Fallout.

“The RIDL and Fallout speculative execution attacks allow attackers to leak confidential data across arbitrary security boundaries on a victim system, for instance compromising data held in the cloud or leaking your information to malicious websites,” notes a new website created by one team of security researchers who notified Intel about the problems. “Our attacks leak data by exploiting the newly disclosed Microarchitectural Data Sampling (or MDS) side-channel vulnerabilities in Intel CPUs. Unlike existing attacks, our attacks can leak arbitrary in-flight data from CPU-internal buffers (Line Fill Buffers, Load Ports, Store Buffers), including data never stored in CPU caches. We show that existing defenses against speculative execution attacks are inadequate, and in some cases actually make things worse. Attackers can use our attacks to obtain sensitive data despite mitigations, due to vulnerabilities deep inside Intel CPUs.”

A second group has created an exploit called ZombieLoad.

“The ZombieLoad attack allows stealing sensitive data and keys while the computer accesses them,” the ZombieLoad website notes. “While programs normally only see their own data, a malicious program can exploit the fill buffers to get hold of secrets currently processed by other running programs. These secrets can be user-level secrets, such as browser history, website content, user keys, and passwords, or system-level secrets, such as disk encryption keys. The attack does not only work on personal computers but can also be exploited in the cloud.”

Amazon, Apple, Google, Microsoft, and Mozilla have all claimed to have issued fixes for the flaws.

“We’re aware of this industry-wide issue and have been working closely with affected chip manufacturers to develop and test mitigations to protect our customers,” a Microsoft statement reads. “We are working to deploy mitigations to cloud services and release security updates to protect Windows customers against vulnerabilities affecting supported hardware chips.”

The RIDL and Fallout researchers have created a tool that will show you (in Windows or Linux) if your PC is vulnerable. But the reality is that you are vulnerable if you’re using an Intel chipset.

Tagged with ,

Join the discussion!

BECOME A THURROTT MEMBER:

Don't have a login but want to join the conversation? Become a Thurrott Premium or Basic User to participate

Register
Comments (17)

17 responses to “Intel Reveals a Serious New Chip Security Flaw”

  1. Avatar

    MikeGalos

    Nice to see both the latest intel chips already have this fixed and the latest Windows patch already has a fix in place for those without the 9 series processors.

  2. Avatar

    BBoileau

    “the reality is that you are vulnerable if you’re using an Intel chipset”

    Wow. Might as well say, if your computing on anything non-mobile your likely to impacted.

  3. Avatar

    igor engelen

    If you want to enable full protection on your Mac you can have performance loss of 40%

    Luckely this isn't really necessary for most people


    https://www.idownloadblog.com/2019/05/14/intel-chip-vulnerability-zombie-load-macos-mojave-10-14-5-fix/

  4. Avatar

    rm

    So, this time Google was not involved by publicly leaking the exploits and the result is, there are patches available before hackers can try to steal information. I am sure it took months to get everything patched by all companies involved. How refreshing!

  5. Avatar

    BeckoningEagle

    I find it problematic that patching these vulnerabilities result in loss of performance. In a datacenter usually people size it 30% to 50% higher to account for growth, but after patching for meltdown, Spectre and now this one, that growth is severely impacted.


    I see a class action coming soon.

  6. Avatar

    VMax

    > Intel has revealed a new, even more serious set of vulnerabilities.


    I'm not sure that's a fair assessment. Peter Bright's article at Ars Technica has a good explanation of the issue.

  7. Avatar

    Otto Gunter

    Certainly the new Intel chipsets do not have these flaws, but are we secure in believing that they do not introduce new, as yet undiscovered, vulnerabilities themselves?

  8. Avatar

    endoftheroad

    No doubt people will ARM themselves against these kinds of attacks. In the long run would it help?

  9. Avatar

    longhorn

    I wonder if AMD is equally impacted or if it's just Intel taking design shortcuts that impact security. It's good these flaws come to the surface. Sometimes I have the feeling that "security" is just used as a means to convince people to accept things. These security vulnerabilities in hardware are very real however.


  10. Avatar

    red.radar

    Reading the papers, it would appear this is a bigger deal for cloud computing companies than general consumer.


    Cloud companies are bigger targets and when you run these exploits your more likely to get something valuable. Looks like the point of these exploits is to get access to the keys that secure the cloud. Not target a singular user


    i would like to me to know if AMD hardware is more secure by design or just hasn’t received the scrutiny it deserves.

Leave a Reply